General

  • Target

    2024-03-11_b7e53b419712f8c06b0e0ee4c629056f_cryptolocker

  • Size

    149KB

  • MD5

    b7e53b419712f8c06b0e0ee4c629056f

  • SHA1

    71477554d4e5a2d0bcd3847b36a3c7c5970305c5

  • SHA256

    3744d20063ad486171aed80252ed17f66bb40e0fbe28a49d67d7571458ac0a22

  • SHA512

    38f5dec9f4d42209a1cd7b1676e9df57dff4da6608a9c39edc2c3af234280b78ca76379d50531ceae406b378e1a0848f21c618af287fc18cb573696a0dfda605

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1e2G:z6a+CdOOtEvwDpjczN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_b7e53b419712f8c06b0e0ee4c629056f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections